Digital rights management in a 3G mobile phone and beyond

In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requirements for digital rights management are reviewed. Next, a framework for protecting digital content in the embedded environment of a mobile phone is proposed and the elements in this system are defined. The means to enforce security in this system are described and a novel "Family Domain" approach to content management is introduced. Our new approach uses key sharing to help alleviate bad user experiences that are associated with some rights management systems. Examples outlining the enrollment of devices and the acquisition, rendering, and superdistribution of content are shown. Our proposed system is not only applicable to a mobile phone system, but may also be extended to other embedded systems, such as personal digital assistants, set-top boxes, or personal computers.

[1]  R. Mori,et al.  Superdistribution : the concept and the architecture , 1990 .

[2]  Jean-Jacques Quisquater,et al.  Cryptology for digital TV broadcasting , 1995, Proc. IEEE.

[3]  Shigeo Araki,et al.  The Memory Stick , 2000, IEEE Micro.

[4]  Benny Pinkas Efficient State Updates for Key Management , 2001, Digital Rights Management Workshop.

[5]  David W. Kravitz,et al.  Secure Open Systems for Protecting Privacy and Digital Services , 2001, Digital Rights Management Workshop.

[6]  M. W. Oliphant The mobile phone meets the Internet , 1999 .

[7]  Stephen Mooney,et al.  Digital Rights Management: Business and Technology , 2001 .

[8]  Frank Hartung,et al.  Watermarking of multimedia content for m-commerce applications , 2000 .

[9]  Bart Preneel,et al.  The Wireless Application Protocol , 2005, Int. J. Netw. Secur..

[10]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[11]  Tomas Sander Golden Times for Digital Rights Management? , 2001, Financial Cryptography.

[12]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[13]  Willms Buhse,et al.  Implications of Digital Rights Management for Online Music - A Business Perspective , 2001, Digital Rights Management Workshop.

[14]  Pravin Bhagwat,et al.  Industry Report: Bluetooth: Technology for Short-Range Wireless Apps , 2001, IEEE Internet Comput..

[15]  K. Enoki i-mode: the mobile Internet service of the 21st century , 2001, 2001 IEEE International Solid-State Circuits Conference. Digest of Technical Papers. ISSCC (Cat. No.01CH37177).

[16]  Joan Feigenbaum,et al.  Privacy Engineering for Digital Rights Management Systems , 2001, Digital Rights Management Workshop.

[17]  John S. Erickson Digital Rights Management: Business and Technology. by William Rosenblatt, William Trippe and Stephen Mooney. Hungry Minds, Inc., November 2001 , 2002, D Lib Mag..

[18]  Fredrik Dahlgren Future mobile phones - complex design challenges from an embedded systems perspective , 2001, Proceedings Seventh IEEE International Conference on Engineering of Complex Computer Systems.

[19]  Richard H. Stern Napster: A Walking Copyright Infringement? , 2000, IEEE Micro.

[20]  Bernard C. Y. Tan,et al.  The Internet is changing the music industry , 2001, Commun. ACM.

[21]  S. M. Cherry Making music pay [digital music distribution] , 2001 .

[22]  P. B. Schneck Persistent access control to prevent piracy of digital information , 1999 .

[23]  Andrew B. Whinston,et al.  Profiting from Value-Added Wireless Services , 2001, Computer.